Exploring biometric data

After reading the preceding sections of this chapter and, hopefully, understanding the purpose and opportunity of using biometrics data within a solution, the next step is a walk-through, conceptually at least, for building the solution.

When using biometric information for authentication, we would see the following:

  • Collection of biometric data: This step uses some sort of input device to capture biometric data. The input of this information is typically referred to as biometric scanning. This scanning may be a fingerprint, the iris of the eye, vocal prompts, or other forms of biometric scanning (quite often photographs are the first biometric form that is used, since photographs are easy to understand and manage).
  • Conversion, labeling, and storage of biometric data: The data that is collected through scanning must then be converted into a digital format and saved in a database and appropriately labeled. This database stores the biometric data of individuals that will need to be authorized by the solution.
  • Selection and configuration of an ML algorithm: A matching algorithm is used to compare newly scanned data to data that is stored and labeled within the digital database. Upon a match, the individual is authenticated, and then decision logic is used to decide what the next step will be, such as granting access to a system or location.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset